P100
LOADING...
#CHATLINER END USER LICENSE AGREEMENT (EULA)
#By using this software platform (the "Software", or "ChatLiner") owned by VIDYPS 79 d.o.o. (the "Licensor"), you acknowledge and agree that the License Agreement sets out the business relationship between you and the Licensor. This agreement was last updated on August 11, 2025.
#THE MAIN TERMS OF THE AGREEMENT IN A NUTSHELL
1. ChatLiner is an open source platform for protecting sensitive, confidential or private information based on Digital Chip Card Locker ("DCCL").
2. Digital Chip Card Locker is a group of mathematically based algorithms that set the highest standards for online data protection.
3. You are entirely responsible for the content you share via ChatLiner, as well as who you share your content with.
4. The Licensor does not claim ownership of the content you share via ChatLiner. You will continue to own your content and may use it in any way you choose.
5. You may terminate this Agreement at any time.
6. The Licensor may prohibit your use of this Software at any time due to your potential violation of this Agreement.
7. The Licensor may terminate this Agreement at any time due to your potential breach of this Agreement.
8. Refunds are only possible if you do not receive the service you paid for. In all other cases, refunds do not apply.
#PERMISSION FOR USE
Permission is hereby granted, free of charge, to any licensee who obtains a copy of the programming code (the "Code") and associated documentation to use the Code without restriction, including, without limitation, the rights to use, copy, modify and/or merge portions of the Code or the Code in its entirety in accordance with the terms of this Agreement.
No individual or business entity is permitted to publish, distribute, sublicense and/or sell copies of the Code under any circumstances.
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Code.
The Code is available at https://soundsofsoftware.com/login.js.
#REGISTRATION PROCESS WORKFLOW
1
The client enters the desired username.
#LOGIN PROCESS WORKFLOW
1
The client enters the registered username and selects the corresponding RSA private key stored on the device the client is using. The login request is sent to the server in the form of a hash code calculated for the entered username.
#DATA SYNCHRONIZATION ACROSS MULTIPLE DEVICES
1. By default, we only have one device from which we can log in with the specified username. Any attempt to log in from another device with a different IP address, or device identification string will be rejected.
2. In order to log in to the system from multiple devices using the same username, we need to provide the server with information on how to identify those devices by synchronizing their login details.
3. Each device is represented by a different ID string and/or IP address, which is the data that the server needs to recognize in exchange for granting the device permission to access the system.
4. We actually need to transfer the login credentials from device to device and then forward them to the server for further processing. The user is assumed to have direct access to all devices from which they want to send a login request.
5. The login details are sensitive and must not be at risk of interception or misuse during transmission, so tokens will be used instead. DCCL technology utilizes tokenization by adopting a series of digits underlying the data transfer process between two desktop or mobile devices at a short distance.
6. The user sends a token request using the primary device (i.e., the device that is already logged in). The client will request as many tokens as there are new devices asking for permission to log in to the system.
7. The server generates a temporary DCCL key consisting of randomly generated digits divided into chunks. This code is used to encrypt data exchanged between the client and the server in the tokenization process.
8. The DCCL key itself is encrypted with the client's public key and decrypted with the corresponding private key on the client side.
9. The token is created on the server as a series of digits and encrypted with a ready-made DCCL key to prevent interception and misuse by unauthorized parties. The token is decrypted with the same DCCL code after it is retrieved by the intended recipient.
10. The generated tokens are stored in a secure location on the server, offline and out of reach of cyberattacks.
11. The user picks up the device they want to log in from using the same username. For example, the primary device is a smartphone, and the other device is a computer. The user enters the digits representing the token displayed on the phone screen into the corresponding field on the computer screen and sends them to the server for verification.
12. The server is yet to verify whether the string of digits that make up the token exists in the database. If the string exists, the public data of the device accessing the system (IP address, data identification string) is recorded, while the login request is considered accepted. If it does not exist, the login request will be rejected.
13. After processing, the token is removed from the server for security reasons. If someone intercepted the series of digits during transmission, they will no longer be able to misuse it.
14. The entire process takes only a few seconds, including the time it takes for the server to digitally process the token.
#SEND AND RECEIVE DIGITAL TELEGRAMS
1. A digital telegram is an electronic message of significant importance that conveys sensitive, confidential, or private information. It contains a text message and, optionally, an attached file of up to 30 MB in size.
2. Digital telegrams are encrypted and digitally signed using Digital Chip Card Locker technology, or DCCL for short.
3. DCCL utilizes two-step authentication to verify your digital identity. While entering your username is the first step, the second step is selecting a uniquely generated file that was saved to your device upon registration.
4. Two-factor verification implemented by DCCL is based on passwordless authentication. Instead of dealing with a traditional password, you will authenticate using its more secure and convenient digital equivalent in the form of a passkey, a combination of hash codes, device identification strings, and registered IP addresses.
5. End-to-end encryption defines communication in such a way that a message (whether it is a registration or login request, or a digital telegram) is encrypted on the sender's side and decrypted on the receiver's side, without the possibility of anyone else intercepting and decrypting it.
6. Using the same username on different devices when logging in can pose a security risk. DCCL introduces tokenization as a principle for synchronizing credentials across multiple devices and preventing compromise of sensitive, confidential or private information.
#INDEMNITY
You hereby indemnify and will at all times keep the Licensor and its partners, subsidiaries and affiliates fully and effectively indemnified from and against
any costs, claims, demands, investigations, liabilities, losses, damages, judgments, settlements and expenses whatsoever, including attorneys' fees
arising out of or in connection with this Agreement, made against or incurred by the Licensor in consequence of any actual or alleged breach or non-performance
committed by you, or your violation of any material term or condition contained in this Agreement.
You agree to fully cooperate and act reasonably as required by the Licensor in the defence of any claim. Notwithstanding the foregoing, the Licensor retains the
exclusive right to settle, compromise and pay any and all claims, demands, proceedings, suits, actions or causes of actions which are brought against the Licensor.
#LAW ON COPYRIGHT AND RELATED RIGHTS OF SERBIA
The Software is fully compliant with the Law on Copyright and Related Rights of Serbia.
#ABUSE OF THE SOFTWARE
By using the Software, you agree not to enable or participate in any activity that is or is intended to be fraudulent, illegal or unauthorized or that artificially compromises the Software and prevents its normal operation.
In the event such activities are discovered, the Licensor reserves the right, in its sole discretion, to delete or relocate your content and any information related to your content uploaded through the Software, in whole or in part. The Licensor reserves the right to suspend or terminate your access to the Software with immediate effect and without notice, and to exercise any legal remedies if the Licensor believes, in its sole discretion, that you are in violation of any part of this clause.
#RELATIONSHIP
You acknowledge and agree that this Agreement establishes a business relationship between you and the Licensor.
Nothing in this Agreement shall be construed: (i) to give either party the power to direct or control the day-to-day activities of the other party; or (ii) to constitute the parties as principal and agent, employer and employee, franchisor and franchisees, partners, co-owners or otherwise as participants in a joint venture.
#NO OBLIGATION
You acknowledge that the Licensor may change the scope of its services from time to time and without prior notice.
#SUPPORT
The Licensor provides technical support for the use of the Software. Contact VIDYPS 79 d.o.o. for more information.
#MISCELLANEOUS
All notices or other communications required under this Agreement shall be delivered to the relevant party by email and shall be deemed delivered on the date the email is sent to the recipient. Nothing in this Agreement shall confer or purport to confer upon any third party any benefit or right to enforce any provision of this Agreement.
If any provision of this Agreement (or part of any provision) is determined by any court or other competent authority to be invalid, illegal or unenforceable, that provision or part of such provision shall, to the extent necessary, be deemed to be excluded from Agreement and will not affect the validity and applicability of other provisions of this Agreement.
This Agreement is regulated and shall be interpreted in accordance with the laws of the Republic of Serbia, and in the event of a dispute between the parties, the courts of Serbia have exclusive jurisdiction.
The Licensor may, in its sole discretion, make changes to this Agreement at any time and will post any changes in an updated version of this Agreement. In certain circumstances, the Licensor may send you an email notifying you of the change.
If you do not agree to use the Software in accordance with the terms and conditions of this Agreement, you must terminate this Agreement by immediately discontinuing use of the Software. Failure to terminate this Agreement shall constitute your acceptance of the new terms and conditions of this Agreement.
The Software is owned by VIDYPS 79 d.o.o. and its structure, algorithms, applications and source code are valuable trade secrets of VIDYPS 79 d.o.o. VIDYPS 79 d.o.o. reserves all rights not expressly granted.
The Software is protected by copyright laws and international copyright treaties, as well as other intellectual property laws and treaties.
The Software is provided "as is", without any warranties of any kind, including but not limited to the warranties of merchantability, fitness for a particular purpose and non-infringement, except as otherwise expressly provided in this Agreement.
In no event shall the Licensor, authors or copyright holders be liable for any claim, damages or other liability arising from, out of or in connection with the Software and the exploitation of the Software, except as otherwise expressly provided in this Agreement.
|